This document provides an example of how to use the static route tracking feature on the PIX 500 Series Security Appliance or the ASA 5500 Series Adaptive Security Appliance in order to enable the device to use redundant or backup Internet connections. In this example, static route tracking allows the security appliance to use an(…)
syslog is a standard for forwarding log messages in an IP network. The term “syslog” is often used for both the actual syslog protocol, as well as the application or library sending syslog messages .
Syslog is a client/server protocol: the syslog sender sends a small (less than 1KB) textual message to the syslog receiver. The receiver is commonly called “syslogd”, “syslog daemon” or “syslog server”. Syslog messages can be sent via UDP and/or TCP. The data is sent in cleartext; although not part of the syslog protocol itself, an SSL wrapper can be used to provide for a layer of encryption through SSL/TLS.
This document describes the process of setting up aÂ SnortÂ network intrusion prevention and detection system on Sun Solaris 10 (SPARC). We will be usingÂ BarnyardÂ for processing events to send to a database (to utilizeÂ BASEÂ or anotherÂ SIMÂ product). This guide will go over bothÂ PostgreSQLÂ andÂ MySQLÂ database output configurations for the sensor, and PostgreSQL for a separate example BASE console. The sensor configuration(…)
A 404 error message is the standard HTTP standard response code which is returned when the visitor cannot communicate with the server. This is a very common error on the web and it occurs when you are trying to visit a page which has either been deleted or has been moved somewhere else. For example,(…)
Opened host ports are usually the most non-physical direct way of forcing entry remotely. Here you would see several tools and ways how to list out your currently opened ports from your managed linux box. Let’s view our first attempt to list out those opened and used ports. # netstat -panut | grep LISTEN We(…)
The telnet command is used to communicate with another host using the TELNET protocol. If telnet is invoked without the host argument, it enters command mode, indicated by its prompt ( telnet>). In this mode, it accepts and executes the commands listed below. If it is invoked with arguments, it performs an open command with(…)
RSync backups data and does it very clean and well. Rsync only transfers those data that have been modified and changed so that the destination host has an exact replica from the source host. Rysnc is a command line backup tool that handles data transfers in an effective and secure manner like any other known(…)
The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network-links. MRTG generates HTML pages containing PNG images which provide a LIVE visual representation of this traffic. MRTG is basically used for generating graphs to a device, network host, IP-based appliances for monitoring usage, live data and statistics usage. This(…)
This article written on 20/09/2008 by Dinesh Suryavanshi, Sometimes we ignore little details, which is a bad thing – because others can use our negligence against us.Most routers and ADSL modems come with a web interface that is used to control and configure the device. The administration panel is accessed with a web-browser, and it(…)
Windows Internet Explorer 8 Beta 2 Windows Internet Explorer 8 is the next version of the worldâ€™s most popular browser that optimizes developer and end-user experiences to provide a window to the Web of online services. Moreover, Internet Explorer 8 offers new features and functionality that enable customers to reach beyond the page in more(…)
Password Sniffer on Linux? Yep, we all need to be informed of passwords being sniffed out! I would not entail those details and cover specific issues of identifying your network securities as that would be large enough to be covered here and case to case basis. However, those two words are being mentioned here and(…)
Yahoo messenger from Yahoo! is one of the most commonly installed messenger on windows-based desktop systems, besides from MSN messenger, which comes as a default windows messenger from windows OS. In Linux world, there are variety of all around chat/voice messengers available. From the default GNOME GAIM messenger, now known as Pidgin, there’s also Kopete(…)